{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T11:22:14Z","timestamp":1774696934481,"version":"3.50.1"},"reference-count":58,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2018,11,3]],"date-time":"2018-11-03T00:00:00Z","timestamp":1541203200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Sciences"],"abstract":"<jats:p>Unique Objects (UNOs) are relevant for real-world applications such as anti-counterfeiting systems. In this work, cork is demonstrated as a UNO, part of the Physical Unclonability and Disorder (PUD) system. An adequate measurement kit (illumination device) and recognition method are also devised and evaluated. Natural hills and valleys of the cork are enhanced using the illumination device and the overall robustness of the recognition application inherent to UNOs is presented. The lighting device is based on grazing light and the recognition task is based on a local feature detector and descriptor called ORB - Oriented FAST (Features from Accelerated Segment Test) and Rotated BRIEF (Binary Robust Independent Elementary Features). The performance evaluation utilizes a private cork database (1500 photos of 500 cork stoppers) and three public iris databases. In the tests carried out on the illumination device, the results clearly show the success of capturing stable\/repeatable features needed for the recognition task in the cork database. This achievement is also reflected in the perfect recognition score achieved in the cork database, in the intra-distance measure     \u03bc  i n t r a     , which gives the notion of average noise between measures, and in the inter-distance     \u03bc  i n t e r      which provides hints about the randomness\/uniqueness of a cork. Regarding the recognition application, its effectiveness is further tested using the iris databases. Regardless of the fact that the recognition algorithm was not designed for the iris recognition problem, the results show that the proposed approach is capable of competing with the techniques found in the literature specially designed for iris recognition. Furthermore, the evaluation shows that the three requirements that constitute a UNO (Disorder, Operability, and Unclonability) are fulfilled, thus supporting the main assertion of this work: that cork is a UNO.<\/jats:p>","DOI":"10.3390\/app8112150","type":"journal-article","created":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T10:43:45Z","timestamp":1541414625000},"page":"2150","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Cork as a Unique Object: Device, Method, and Evaluation"],"prefix":"10.3390","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4769-8843","authenticated-orcid":false,"given":"Valter","family":"Costa","sequence":"first","affiliation":[{"name":"INEGI\u2014Institute of Science and Innovation in Mechanical and Industrial Engineering, Porto 4200-465, Portugal"},{"name":"FEUP\u2014Faculty of Engineering of the University of Porto, Porto 4200-465, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0317-4714","authenticated-orcid":false,"given":"Armando","family":"Sousa","sequence":"additional","affiliation":[{"name":"FEUP\u2014Faculty of Engineering of the University of Porto, Porto 4200-465, Portugal"},{"name":"INESC TEC\u2014INESC Technology and Science (formerly INESC Porto), Porto 4200-465, Portugal"}]},{"given":"Ana","family":"Reis","sequence":"additional","affiliation":[{"name":"INEGI\u2014Institute of Science and Innovation in Mechanical and Industrial Engineering, Porto 4200-465, Portugal"},{"name":"FEUP\u2014Faculty of Engineering of the University of Porto, Porto 4200-465, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2018,11,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Costa, V., Sousa, A., and Reis, A. (2018). Preventing Wine Counterfeiting by Individual Cork Stopper Recognition Using Image Processing Technologies. J. Imag., 4.","DOI":"10.3390\/jimaging4040054"},{"key":"ref_2","unstructured":"Joaquim Ramos Costa, V., Jorge Miranda De Sousa, A., Rosanete Louren\u00e7o Reis, A., and Gerard Celina Robert Loyens, D. (2018). Device And Method For Identifying A Cork Stopper, And Respective Kit. (WO 2018\/078600 A1), Available online: https:\/\/patents.google.com\/patent\/WO2018078600A1\/en."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Lee, P.S., and Ewe, H.T. (2004). Individual Recognition Based on Human Iris Using Fractal Dimension Approach. Biometric Authentication, Springer.","DOI":"10.1007\/978-3-540-25948-0_64"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1016","DOI":"10.1016\/j.patcog.2009.08.016","article-title":"Comparison and combination of iris matchers for reliable personal authentication","volume":"43","author":"Kumar","year":"2010","journal-title":"Pattern Recog."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Devadas, S., and Koushanfar, F. (2012). Security Based on Physical Unclonability and Disorder. Introduction to Hardware Security and Trust, Springer.","DOI":"10.1007\/978-1-4419-8080-9_4"},{"key":"ref_6","unstructured":"European Observatory on Infringements of Intellectual Property Rights (2016). Infringement of Protected Geographical Indications for Wine, Spirits, Agricultural Products and Foodstuffs in the European Union, EUIPO. Technical Report; European Observatory on Infringements of Intellectual Property Rights."},{"key":"ref_7","unstructured":"Medasani, S., Srinivasa, N., and Owechko, Y. (2004, January 25\u201329). Active learning system for object fingerprinting. Proceedings of the 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541), Budapest, Hungary."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1038\/436475a","article-title":"Forgery: \u2019fingerprinting\u2019 documents and packaging","volume":"436","author":"Buchanan","year":"2005","journal-title":"Nature"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Sharma, A., Subramanian, L., and Brewer, E.A. (2011, January 17\u201321). PaperSpeckle: Microscopic fingerprinting of paper. Proceedings of the 18th ACM Conference on Computer And Communications Security\u2014CCS \u201911, New York, NY, USA.","DOI":"10.1145\/2046707.2046721"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Takahashi, T., and Ishiyama, R. (2014, January 16\u201320). FIBAR: Fingerprint Imaging by Binary Angular Reflection for Individual Identification of Metal Parts. Proceedings of the 2014 Fifth International Conference on Emerging Security Technologies, Lisbon, Portugal.","DOI":"10.1109\/EST.2014.25"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Rublee, E., Rabaud, V., Konolige, K., and Bradski, G. (2011, January 6\u201313). ORB: An efficient alternative to SIFT or SURF. Proceedings of the 2011 International Conference on Computer Vision, Barcelona, Spain.","DOI":"10.1109\/ICCV.2011.6126544"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Takahashi, T., Kudo, Y., and Ishiyama, R. (2017, January 8\u201312). Mass-produced parts traceability system based on automated scanning of \u201cFingerprint of Things\u201d. Proceedings of the 2017 Fifteenth IAPR International Conference on Machine Vision Applications (MVA), Nagoya, Japan.","DOI":"10.23919\/MVA.2017.7986836"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Ishiyama, R., Kudo, Y., and Takahashi, T. (2016, January 14\u201317). mIDoT: Micro identifier dot on things\u2014A tiny, efficient alternative to barcodes, tags, or marking for industrial parts traceability. Proceedings of the 2016 IEEE International Conference on Industrial Technology (ICIT), Taibei, Taiwan.","DOI":"10.1109\/ICIT.2016.7474850"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Kudo, Y., Zwaan, H., Takahashi, T., Ishiyama, R., and Jonker, P. (2018, January 12\u201315). Tip-on-a-chip: Automatic Dotting with Glitter Ink Pen for Individual Identification of Tiny Parts. Proceedings of the 9th ACM Multimedia Systems Conference on\u2014MMSys \u201918, New York, NY, USA.","DOI":"10.1145\/3204949.3208116"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Wigger, B., Meissner, T., Winkler, M., Foerste, A., Jetter, V., Buchholz, A., and Zimmermann, A. (2018). Label-\/tag-free traceability of electronic PCB in SMD assembly based on individual inherent surface patterns. Int. J. Adv. Manuf. Technol.","DOI":"10.1007\/s00170-018-2492-x"},{"key":"ref_16","unstructured":"Pappu, R. (2001). Physical One-Way Functions. [Ph.D. Thesis, Massachusetts Institute of Technology]."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.R., and Naccache, D. (2010). Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions. Towards Hardware-Intrinsic Security, Springer. Number 71369 in Information Security and Cryptography.","DOI":"10.1007\/978-3-642-14452-3"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Dolev, S., Krzywiecki, L., Panwar, N., and Segal, M. (2015, January 28\u201330). Optical PUF for Non Forwardable Vehicle Authentication. Proceedings of the 2015 IEEE 14th International Symposium on Network Computing and Applications, Cambridge, MA, USA.","DOI":"10.1109\/NCA.2015.25"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1126\/science.1074376","article-title":"Physical One-Way Functions","volume":"297","author":"Pappu","year":"2002","journal-title":"Science"},{"key":"ref_20","unstructured":"R\u00fchrmair, U., Hilgers, C., Urban, S., Weiersh\u00e4user, A., Dinter, E., Forster, B., and Jirauschek, C. (2018, October 31). Optical PUFs Reloaded. Available online: http:\/\/www.crypto.rub.de\/imperia\/md\/crypto\/kiltz\/ulrich_paper_48.pdf."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"De Decker, B., and Chadwick, D.W. (2012). Security Analysis of Image-Based PUFs for Anti-counterfeiting. Communications and Multimedia Security, Springer.","DOI":"10.1007\/978-3-642-32805-3"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/s13389-012-0041-3","article-title":"Analysis and experimental evaluation of image-based PUFs","volume":"2","author":"Shariati","year":"2012","journal-title":"J. Cryptogr. Eng."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Tuyls, P., Schrijen, G.J., \u0160kori\u0107, B., van Geloven, J., Verhaegh, N., and Wolters, R. (2006). Read-Proof Hardware from Protective Coatings. Proc. Cryptogr. Hardw. Embed. Syst., 369\u2013383.","DOI":"10.1007\/11894063_29"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"\u0160kori\u0107, B., Maubach, S., Kevenaar, T., and Tuyls, P. (2006). Information-theoretic analysis of capacitive physical unclonable functions. J. Appl. Phys., 100.","DOI":"10.1063\/1.2209532"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., and Devadas, S. (2002, January 17\u201320). Silicon Physical Random Functions. Proceedings of the 9th ACM Conference on Computer and Communications Security, New York, NY, USA.","DOI":"10.1145\/586110.586132"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","article-title":"FPGA Intrinsic PUFs and Their Use for IP Protection","volume":"4727","author":"Guajardo","year":"2007","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_27","unstructured":"Holcomb, D. (2007, January 11\u201313). Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. Proceedings of the Conference on RFID Security, Graz, Austria."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Arjona, R., Prada-Delgado, M., Arcenegui, J., and Baturone, I. (2018). A PUF- and Biometric-Based Lightweight Hardware Solution to Increase Security at Sensor Nodes. Sensors, 18.","DOI":"10.3390\/s18082429"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Gong, M., Liu, H., Min, R., and Liu, Z. (2018). Pitfall of the Strongest Cells in Static Random Access Memory Physical Unclonable Functions. Sensors, 18.","DOI":"10.3390\/s18061776"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1049\/iet-ifs.2009.0032","article-title":"How to strongly link data and its medium: The paper case","volume":"4","author":"Bulens","year":"2010","journal-title":"IET Inf. Secur."},{"key":"ref_31","unstructured":"Lee, J., Lim, D.L.D., Gassend, B., Suh, G., Dijk, M.V., and Devadas, S. (2004, January 17\u201319). A technique to build a secret key in integrated circuits for identification and authentication applications. Proceedings of the 2004 Symposium on VLSI Circuits, Tokyo, Japan."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Kursawe, K., Sadeghi, A.R., Schellekens, D., Skoric, B., and Tuyls, P. (November, January 29). Reconfigurable physical unclonable functions\u2014Enabling technology for tamper-resistant storage. Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, HOST, San Francisco, CA, USA.","DOI":"10.1109\/HST.2009.5225058"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Lu, Z., Li, D., Liu, H., Gong, M., and Liu, Z. (2017). An Anti-Electromagnetic Attack PUF Based on a Configurable Ring Oscillator for Wireless Sensor Networks. Sensors, 17.","DOI":"10.3390\/s17092118"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Cao, Y., Zhao, X., Ye, W., Han, Q., and Pan, X. (2018). A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks. Sensors, 18.","DOI":"10.3390\/s18020322"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Xu, H., Ding, J., Li, P., Zhu, F., and Wang, R. (2018). A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function. Sensors, 18.","DOI":"10.3390\/s18030760"},{"key":"ref_36","unstructured":"Shariati, S. (2013). Image-Based Physical Unclonable Functions for Anti-Counterfeiting. [Ph.D. Thesis, Catholic University of Louvain]."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Valehi, A., Razi, A., Cambou, B., Yu, W., and Kozicki, M. (2017, January 15\u201317). A graph matching algorithm for user authentication in data networks using image-based physical unclonable functions. Proceedings of the 2017 Computing Conference, London, UK.","DOI":"10.1109\/SAI.2017.8252196"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"4738","DOI":"10.1038\/s41598-018-22876-8","article-title":"Using unique surface patterns of injection moulded plastic components as an image based Physical Unclonable Function for secure component identification","volume":"8","author":"Wigger","year":"2018","journal-title":"Sci. Rep."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"2390","DOI":"10.1007\/s11837-017-2502-8","article-title":"Microstructure-Based Counterfeit Detection in Metal Part Manufacturing","volume":"69","author":"Dachowicz","year":"2017","journal-title":"JOM"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1145\/358669.358692","article-title":"Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography","volume":"24","author":"Fischler","year":"1981","journal-title":"Commun. ACM"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","article-title":"Distinctive Image Features from Scale-Invariant Keypoints","volume":"60","author":"Lowe","year":"2004","journal-title":"Int. J. Comput. Vis."},{"key":"ref_42","unstructured":"Harris, C., and Stephens, M. (September, January 31). A combined corner and edge detector. Proceedings of the Fourth Alvey Vision Conference, Manchester, UK."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Punithavathi, P., Geetha, S., and Sasikala, S. (2017, January 22\u201324). Generation of Cancelable Iris Template Using Bi-level Transformation. Proceedings of the 6th International Conference on Bioinformatics and Biomedical Science\u2014ICBBS \u201917, New York, NY, USA.","DOI":"10.1145\/3121138.3121185"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Awalkar, K.V., Kanade, S.G., Jadhav, D.V., and Ajmera, P.K. (2015, January 27\u201330). A multi-modal and multi-algorithmic biometric system combining iris and face. Proceedings of the 2015 International Conference on Information Processing (ICIP), Quebec City, QC, Canada.","DOI":"10.1109\/INFOP.2015.7489434"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Mohamed, E., Ahmed, F., Rehan, S.E., and Mohamed, A.A. (2011, January 5\u20138). Rough set analysis and cloud model algorithm to automated knowledge acquisition for classification Iris to chieve high security. Proceedings of the 2011 11th International Conference on Hybrid Intelligent Systems (HIS), Malacca, Malaysia.","DOI":"10.1109\/HIS.2011.6122080"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.optlaseng.2008.07.004","article-title":"Region-based SIFT approach to iris recognition","volume":"47","author":"Belcher","year":"2009","journal-title":"Opt. Lasers Eng."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Marciniak, T., Da\u0327browski, A., Chmielewska, A., and Krzykowska, A. (2011). Analysis of Particular Iris Recognition Stages. Multimedia Communications, Services and Security, Springer.","DOI":"10.1007\/978-3-642-21512-4_24"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"097202","DOI":"10.1117\/1.2977528","article-title":"Iris recognition based on relative variation analysis with feature selection","volume":"47","author":"Taur","year":"2008","journal-title":"Opt. Eng."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Wang, Y., and Han, J. (2004). Iris Recognition Using Support Vector Machines. Advances in Neural Networks\u2014ISNN, Springer.","DOI":"10.1007\/978-3-540-28647-9_102"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s10044-015-0482-2","article-title":"Texture code matrix-based multi-instance iris recognition","volume":"19","author":"Umer","year":"2016","journal-title":"Pattern Anal. Appl."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1109\/TIFS.2011.2166069","article-title":"Half-Iris Feature Extraction and Recognition Using a New Class of Biorthogonal Triplet Half-Band Filter Bank and Flexible k-out-of-n: A Postclassifier","volume":"7","author":"Rahulkar","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Kumar, A., Hanmandlu, M., Das, A., and Gupta, H.M. (April, January 29). Biometric based personal authentication using fuzzy binary decision tree. Proceedings of the 2012 5th IAPR International Conference on Biometrics (ICB), New Delhi, India.","DOI":"10.1109\/ICB.2012.6199783"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Zhou, Y., and Kumar, A. (2010, January 23\u201326). Personal Identification from Iris Images Using Localized Radon Transform. Proceedings of the 2010 20th International Conference on Pattern Recognition, Istanbul, Turkey.","DOI":"10.1109\/ICPR.2010.696"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Costa, V., Sousa, A., and Reis, A. (2018, January 13\u201316). CBIR for a wine anti-counterfeiting system using imagery from cork stoppers. Proceedings of the Iberian Conference on Information Systems and Technologies, CISTI, C\u00e1ceres, Spain.","DOI":"10.23919\/CISTI.2018.8399225"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Shariati, S., Jacques, L., Standaert, F.X., Macq, B., Salhi, M.A., and Antoine, P. (2010, January 26\u201329). Randomly driven fuzzy key extraction of unclonable images. Proceedings of the 2010 IEEE International Conference on Image Processing, Hong Kong, China.","DOI":"10.1109\/ICIP.2010.5652420"},{"key":"ref_56","unstructured":"Shariati, S., Standaert, F.X., Jacques, L., Macq, B., Salhi, M.A., and Antoine, P. (2010, January 11\u201312). Random Profiles of Laser Marks. Proceedings of the 31st WIC Symposium on Information Theory in the Benelux, Rotterdam, The Netherlands."},{"key":"ref_57","first-page":"36","article-title":"Caracteriza\u00e7\u00e3o de espumas pl\u00e1sticas e corti\u00e7a para aplica\u00e7\u00e3o em um sistema de seguran\u00e7a acoplado ao parachoque frontal veicular","volume":"20","author":"Costa","year":"2017","journal-title":"Rev. Ci\u00eancia Tecnol."},{"key":"ref_58","unstructured":"G154-16 (2016). Standard Practice for Operating Fluorescent Ultraviolet (UV) Lamp Apparatus for Exposure of Nonmetallic Materials, ASTM. Technical Report."}],"container-title":["Applied Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2076-3417\/8\/11\/2150\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:27:48Z","timestamp":1760196468000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2076-3417\/8\/11\/2150"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,3]]},"references-count":58,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2018,11]]}},"alternative-id":["app8112150"],"URL":"https:\/\/doi.org\/10.3390\/app8112150","relation":{},"ISSN":["2076-3417"],"issn-type":[{"value":"2076-3417","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,3]]}}}